Tactics of the Crescent Moon

Tactics of the Crescent Moon

Author: H. J. Poole

Publisher: Posterity Press (NC)

Published: 2004

Total Pages: 0

ISBN-13: 9780963869579

DOWNLOAD EBOOK

Tactics of the Crescent Moon shows for the first time in any detail how Muslim militants fight at short range. From the vast quantities of intelligence available, its author extracts the small-unit tactical trends. While the enemy's combat method may seem amateurish, they are nonetheless very effective in a 4th-generation-warfare environment. Those methods have already forced the Israeli Army out of Southern Lebanon and the Soviet Army out of Afghanistan. To make matters worse, they may be improving. In the book's forward, Maj. Gen. Ray L. Smith warns that the current crop of irregulars have flexible and adaptable training techniques and tactical methods. This book will help the reader to counter them.


Militant Tricks

Militant Tricks

Author: H. J. Poole

Publisher: Posterity Press (NC)

Published: 2005

Total Pages: 0

ISBN-13: 9780963869586

DOWNLOAD EBOOK

This book is now on the U.S. Army's most prestigious pre-deployment reading list. Since 9/11, our deployed troops have learned many things. Though the war in Afghanistan is still raging, many of their hard-won lessons have yet to assimilated by the Stateside bureaucracy. To help, Militant Tricks has recounted America's progress in Iraq and Afghanistan from the standpoint of East Asian deception. Both countries were part of the Mongol Empire for over 200 years and thus prone to every sort of ancient Chinese illusion. Militant Tricks also contains the tactical "techniques" with which to counter an Islamic extremist's urban offensive. While some of these nontraditional techniques were risked during the Baghdad Surge, they may soon be forgotten.


The Tactics of Aelian

The Tactics of Aelian

Author: Christopher Anthony Matthew

Publisher: Casemate Publishers

Published: 2012-01-01

Total Pages: 249

ISBN-13: 1848849001

DOWNLOAD EBOOK

Christopher Matthew's new edition is based on the 1616 edition but written in modern English with new renditions of all its accompanying figures. It has the original 1616 notes as well as comprehensive new notes and cross references to the other ancient manuals (such as Arrian and Leo) that drew upon it.


Phantom Soldier

Phantom Soldier

Author: H. J. Poole

Publisher: Posterity Press (NC)

Published: 2001

Total Pages: 0

ISBN-13: 9780963869555

DOWNLOAD EBOOK

"Phantom Soldier" is now on the U.S. Army's most prestigious pre-deployment reading list for a reason. It won't please those who have come to believe that wars are won and casualties limited through technology, or that the victor's version of one is always correct. But, all U.S. security personnel should read it. Possibly the West's best treatise on Oriental warfare, it sheds new light on what Asian infantry can do: (1) alternate between guerrilla, mobile, and positional warfare; (2) use "ordinary forces" to engage and "extraordinary forces [infiltrators]" to defeat; and then (3) retreat to save lives. What occurred in history doesn't change, but one's perception of it does--as he comes to better understand his former foe. Here's what really happened at Guadalcanal, Iwo Jima, Chosin Reservoir, and Hue City. Those who believe this book's cover art to be fantasy have only to google the term "dac cong." Through how the NVA held their own without resupply, tanks, artillery, or air power, U.S. grunts could better survive the more lethal enemy weaponry of the 21st Century.


Future U.S. Security Relationships with Iraq and Afghanistan

Future U.S. Security Relationships with Iraq and Afghanistan

Author: David E. Thaler

Publisher: Rand Corporation

Published: 2008

Total Pages: 183

ISBN-13: 0833041975

DOWNLOAD EBOOK

The greater the emphasis on building these capabilities now, the faster indigenous air forces will be able to operate independently - and the faster the operational demands on the U.S. Air Force will diminish."--BOOK JACKET.


The Incan Army: Volume II Strategy, Tactics and Logistics

The Incan Army: Volume II Strategy, Tactics and Logistics

Author: Leiner Cárdenas Fernández

Publisher: Babelcube Inc.

Published: 2018-10-02

Total Pages: 163

ISBN-13: 1547551917

DOWNLOAD EBOOK

In this second volume on the Incan army, we will explore its political and administrative organization and the excellent planning that allowed the Incan State to experience internal and external safety. Our main focus, however, will be mainly on the development of wartime technology and the application of advanced concepts and procedures of strategy, tactics and logistics. Although the times were quite different, the Incan army had put many of the activities that correspond to the functional fields of the Joint Chiefs of Staff into practice: personnel, intelligence, instruction, operations and logistics, similar to those of a modern army. For a more in-depth understanding, terms that are compatible with current concepts and military terminology will be used.


Asymmetric Warfare

Asymmetric Warfare

Author: Rod Thornton

Publisher: Polity

Published: 2007-02-12

Total Pages: 253

ISBN-13: 074563365X

DOWNLOAD EBOOK

In recent years, the nature of conflict has changed. Through asymmetric warfare radical groups and weak state actors are using unexpected means to deal stunning blows to more powerful opponents in the West. From terrorism to information warfare, the Wests air power, sea power and land power are open to attack from clever, but much weaker, enemies. In this clear and engaging introduction, Rod Thornton unpacks the meaning and significance of asymmetric warfare, in both civilian and military realms, and examines why it has become such an important subject for study. He seeks to provide answers to key questions, such as how weaker opponents apply asymmetric techniques against the Western world, and shows how the Wests military superiority can be seriously undermined by asymmetric threats. The book concludes by looking at the ways in which the US, the state most vulnerable to asymmetric attack, is attempting to cope with some new battlefield realities. This is an indispensable guide to one of the key topics in security studies today.